Skip to main content

Medium blog navigation

One map for the cybersecurity blog.

A Docusaurus navigation layer for Andrey Pautov's Medium articles: newest posts, deep CTI guides, AI-assisted security workflows, red-team labs, malware analysis, cloud security, and role-based reading paths.

Latest from RSS

Newest articles, sorted by publish date

RSS snapshot analyzed on 2026-05-21. Labels are based on available body length and article role.

Full guide

The Intelligent Shield. OpenCTI

OpenCTI deployment and AI-driven enrichment guide covering STIX 2.1, connectors, feeds, confidence scoring, hardening, and operational runbooks.

ctitoolaidetectionOpenCTI
Short guide

CTI Analyst Field Manual - Complete Reference

Entry point for the CTI Analyst Field Manual, intended as a reference map rather than a single deep technical walkthrough.

ctiguidereference
Article

Customer-Driven AI CTI Project

Overview and workflow quick reference for a gate-controlled CTI-to-detection project model.

ctiaidetectionworkflow

Original order + tags

Filter high-signal articles by format and tag

Full guide

The Intelligent Shield. OpenCTI

OpenCTI deployment and AI-driven enrichment guide covering STIX 2.1, connectors, feeds, confidence scoring, hardening, and operational runbooks.

ctitoolaidetectionOpenCTI
Short guide

CTI Analyst Field Manual - Complete Reference

Entry point for the CTI Analyst Field Manual, intended as a reference map rather than a single deep technical walkthrough.

ctiguidereference
Article

Customer-Driven AI CTI Project

Overview and workflow quick reference for a gate-controlled CTI-to-detection project model.

ctiaidetectionworkflow

Complete topic navigation

18 Medium blog groups

These groups mirror the original Medium master index order and give direct section links for the full 100+ article map.

CTI & Threat Intelligence

Full guide

Threat intelligence tradecraft, actor research, telecom threat mapping, attribution, infrastructure pivoting, ATT&CK, and CTI-to-detection work.

ctidetectionaitoolsoctelecomattributionATT&CK
  • The Intelligent Shield. OpenCTI
  • Customer-Driven AI CTI Project Template. Part 1: Foundations
  • Customer-Driven AI CTI Project Template. Part 2A: Phase-by-Phase Execution Guide
  • Customer-Driven AI CTI Project Template: Part 2B - Reference Toolkit
  • Applying Sherman Kent’s Analytic Discipline to CTI
  • CTI-Led Defensive Strategy for a Cellular Provider
  • Manual CTI vs. AI-Assisted CTI
  • ATT&CK as a Working Tool
  • Attribution Methodology
  • Infrastructure Pivoting
Open this section in the Medium master index

AI in Cybersecurity & HexStrike-AI

Full guide

Big-picture AI security, HexStrike-AI setup, MCP/Cursor workflows, Gemini/OpenAI/Llama configuration, and productivity frameworks.

aioffensivetoolHexStrikeMCPCursor
  • The AI Revolution in Cybersecurity
  • HexStrike-AI: A Force Multiplier for Red Teams
  • HexStrike AI: Install, Configure, and Run MCP with Gemini, OpenAI, Cursor, Llama
  • HexStrike on Kali Linux 2025.4
  • HexStrike + Gemini vs. HackerAI
  • The 20x Employee
Open this section in the Medium master index

AI-Driven Pentesting & Exploitation

Full guide

Hands-on AI-assisted pentesting workflows for network discovery, web apps, wireless, SMB/SSH, password recovery, cloud scanning, and lab exploitation.

offensivelabaitoolpentestwirelesscloud
  • AI-Driven Pentesting at Home
  • AI-Driven Web Application Pentesting with HexStrike-AI
  • AI-Driven Wireless Penetration Testing
  • HexStrike + Cursor full subnet compromise
  • AI-Assisted Web and Cloud Penetration Testing
  • StratusAI
Open this section in the Medium master index

Burp Suite, Web Scanners & LLM/MCP

Article

Burp Suite, scanner interpretation, MCP integrations, payload planning, and classic web scanner guides.

weboffensivetoolBurpMCPscanner
  • Getting More from Burp Suite with LLMs
  • Burp Suite MCP + Gemini CLI
  • Mastering Burp Suite Vulnerability Scanner
  • Cracking Web Interfaces with Burp Suite
Open this section in the Medium master index

Reconnaissance & OSINT

Article

Target discovery, Shodan, Censys, theHarvester, Sublist3r, Amass, SpiderFoot, WhatWeb, and LLM-assisted recon planning.

osintoffensivetoolreconattack surface
  • Nmap Meets ChatGPT
  • Shodan
  • theHarvester
  • Sublist3r
  • OWASP Amass
  • SpiderFoot
  • Censys
  • WhatWeb
Open this section in the Medium master index

Nmap & Network Scanning

Full guide

Nmap fundamentals, service detection, version probing, scripts, scan strategy, and network assessment syntax.

offensivetoolnetworknmapscanner
  • Mastering Nmap Part 1
  • Mastering Nmap Part 2
  • Mastering Nmap Part 3
  • Mastering Nmap Part 4: Scripts
Open this section in the Medium master index

Web Application Security (Non-AI)

Full guide

Traditional web testing with OWASP ZAP, SQLMap, DirBuster, Nikto, and staged reconnaissance-to-scanning methodology.

weboffensivetoolOWASPSQL injection
  • OWASP ZAP
  • SQLMap Part 1
  • SQLMap Part 2
  • DirBuster
  • Nikto
  • Web App PT Stage 1
  • Web App PT Stage 2
Open this section in the Medium master index

Metasploit & Exploitation

Full guide

Metasploit foundations, auxiliary modules, exploit modules, and practical SSH/FTP/Telnet exploitation workflows.

offensivetoolexploitationMetasploit
  • Metasploit Part 1
  • Auxiliary modules
  • Exploit modules
  • SSH exploitation
  • FTP exploitation
  • Telnet cracking
Open this section in the Medium master index

Password & Credential Cracking

Full guide

John the Ripper, Hashcat, Hydra, WiFi cracking, PDF/Office/ZIP recovery, RDP, RTSP, and custom wordlist generation.

passwordsoffensivetoolcredentialscracking
  • John the Ripper
  • Hashcat
  • Hydra
  • Aircrack-ng
  • PDF cracking
  • Office document cracking
  • RTSP brute force
  • Personal Pass Generator
Open this section in the Medium master index

Active Directory & Red Team

Full guide

AD penetration testing, ADCS ESC8, certificate abuse, lab deployment, and MITRE ATT&CK tool mapping for red teams.

adoffensivelabred teamADCS
  • Active Directory Penetration Testing
  • ADCS ESC8
  • AD lab in Cursor AI
  • Tools by MITRE ATT&CK
Open this section in the Medium master index

Cloud & Kubernetes Security

Full guide

GCP pentesting, vulnerable cloud labs, Kubernetes lab design, black-box K8s playbooks, and cloud-native detection.

cloudkubernetesgcpawslaboffensive
  • GCP Pentesting
  • Vulnerable GCP lab
  • Vulnerable cloud lab
  • Vulnerable Kubernetes lab
  • Black-box Kubernetes PT
  • Cloud-native security
Open this section in the Medium master index

Labs & Training Environments

Full guide

Vulnerable Ubuntu and Windows labs, IIS/SharePoint lab, DVWA automation, DragonRx, vulnerable AI lab, and one-prompt training environments.

labtrainingterraformwindowslinuxai
  • Vulnerable Ubuntu lab
  • Vulnerable Windows lab
  • IIS SharePoint lab
  • DVWA with Ansible
  • Vulnerable AI Lab
  • Operation DragonRx
Open this section in the Medium master index

Malware Analysis & Forensics

Full guide

Static malware analysis, file metadata, strings, obfuscation, automated triage tools, Android APK analysis, and AI-assisted forensics.

malwareforensicstoolaiandroidstatic analysis
  • Android APK Analysis Tool
  • AIDebug
  • Static Malware Analysis
  • File Fingerprinting
  • Strings Analysis
  • Obfuscation
  • Digital Forensics with AI
Open this section in the Medium master index

Threat Hunting & Detection

Full guide

Endpoint hunting, protocol-level hunting, Pyramid of Pain, single-event and correlation detection rules, and CI/CD defense.

detectionsocthreat huntingblue teamrules
  • Endpoint Threat Hunting
  • Wireshark threat hunting
  • Pyramid of Pain
  • Single-event detection
  • Correlation detection
  • CI/CD defense
Open this section in the Medium master index

Tool Development & Cursor AI

Article

Building security tools and payload workflows with Cursor AI, including Android Rubber Ducky payloads and Arduino Leonardo hardware builds.

toolaicursorpayloadshardware
  • Android Rubber Ducky payloads in Cursor AI
  • USB Rubber Ducky with Arduino Leonardo
Open this section in the Medium master index

SOC, Awareness & Best Practices

Article

SOC Tier 1 onboarding, awareness, phishing protection, OWASP Top 10 secure coding, server hardening, and baseline PT toolkits.

socawarenesssecure codinghardeningtraining
  • SOC Tier 1 onboarding
  • Information Security Awareness
  • Phishing awareness
  • OWASP Top 10
  • Server hardening
  • Basic PT toolkit
Open this section in the Medium master index

Logging, DevOps & XPLG

Article

Fluent Bit, AWS EKS log shipping, Kubernetes DaemonSets, EKS control-plane logs, XPLG integration, and Linux reporting tools.

devopsloggingcloudkubernetestoolXPLG
  • Fluent Bit Windows service
  • Fluent Bit on AWS EKS
  • Fluent Bit Kubernetes DaemonSet
  • EKS logs to XPLG
  • syscheck_beauty
Open this section in the Medium master index

Direct links

High-confidence article URLs

This list follows the original navigator group order. When an exact article URL is not verified, the link opens the correct section in the Medium master index.